|
29 | 29 | import org.junit.jupiter.api.extension.ExtendWith; |
30 | 30 | import org.mockito.Mockito; |
31 | 31 | import org.mockito.junit.jupiter.MockitoExtension; |
| 32 | +import org.springframework.security.authentication.UsernamePasswordAuthenticationToken; |
| 33 | +import org.springframework.security.core.authority.SimpleGrantedAuthority; |
32 | 34 | import org.springframework.security.core.context.SecurityContextHolder; |
33 | 35 |
|
34 | 36 | import javax.servlet.FilterChain; |
35 | 37 | import javax.servlet.ServletException; |
36 | 38 | import javax.servlet.ServletRequest; |
37 | 39 | import javax.servlet.ServletResponse; |
| 40 | +import javax.servlet.http.Cookie; |
38 | 41 | import javax.servlet.http.HttpServletRequest; |
39 | 42 | import javax.servlet.http.HttpServletResponse; |
40 | 43 |
|
41 | 44 | import java.io.IOException; |
| 45 | +import java.lang.reflect.Field; |
| 46 | +import java.util.Collections; |
42 | 47 |
|
43 | 48 | import static org.mockito.ArgumentMatchers.any; |
44 | 49 | import static org.mockito.Mockito.atLeastOnce; |
@@ -124,4 +129,124 @@ public void testDoFilter_skipsJwtWhenSsoEnabled() throws IOException, ServletExc |
124 | 129 | verify(jwtFilter, never()).doFilter(any(ServletRequest.class), any(ServletResponse.class), any(FilterChain.class)); |
125 | 130 | verify(chain, times(1)).doFilter(req, res); |
126 | 131 | } |
| 132 | + |
| 133 | + @Test |
| 134 | + void testDoFilter_invokesJwtFilter_whenBearerHeaderPresent() throws Exception { |
| 135 | + RangerContextHolder.resetSecurityContext(); |
| 136 | + SecurityContextHolder.clearContext(); |
| 137 | + PropertiesUtil.getPropertiesMap().put("ranger.sso.enabled", "false"); |
| 138 | + |
| 139 | + HttpServletRequest req = Mockito.mock(HttpServletRequest.class); |
| 140 | + HttpServletResponse res = Mockito.mock(HttpServletResponse.class); |
| 141 | + FilterChain chain = Mockito.mock(FilterChain.class); |
| 142 | + |
| 143 | + Mockito.when(req.getHeader("Authorization")).thenReturn("Bearer token"); |
| 144 | + |
| 145 | + RangerJwtAuthFilter jwt = Mockito.mock(RangerJwtAuthFilter.class); |
| 146 | + |
| 147 | + RangerJwtAuthWrapper wrapper = new RangerJwtAuthWrapper(); |
| 148 | + setField(wrapper, "rangerJwtAuthFilter", jwt); |
| 149 | + |
| 150 | + wrapper.doFilter(req, res, chain); |
| 151 | + |
| 152 | + verify(jwt, times(1)).doFilter(req, res, chain); |
| 153 | + verify(chain, times(1)).doFilter(req, res); |
| 154 | + } |
| 155 | + |
| 156 | + @Test |
| 157 | + void testDoFilter_skipsJwt_whenAlreadyAuthenticated_evenIfBearerHeaderPresent() throws Exception { |
| 158 | + PropertiesUtil.getPropertiesMap().put("ranger.sso.enabled", "false"); |
| 159 | + |
| 160 | + // mark request authenticated |
| 161 | + SecurityContextHolder.getContext().setAuthentication( |
| 162 | + new UsernamePasswordAuthenticationToken( |
| 163 | + "kafka", |
| 164 | + "", |
| 165 | + Collections.singletonList(new SimpleGrantedAuthority("ROLE_USER")))); |
| 166 | + |
| 167 | + HttpServletRequest req = Mockito.mock(HttpServletRequest.class); |
| 168 | + HttpServletResponse res = Mockito.mock(HttpServletResponse.class); |
| 169 | + FilterChain chain = Mockito.mock(FilterChain.class); |
| 170 | + RangerJwtAuthFilter jwt = Mockito.mock(RangerJwtAuthFilter.class); |
| 171 | + RangerJwtAuthWrapper wrapper = new RangerJwtAuthWrapper(); |
| 172 | + setField(wrapper, "rangerJwtAuthFilter", jwt); |
| 173 | + |
| 174 | + wrapper.doFilter(req, res, chain); |
| 175 | + |
| 176 | + verify(jwt, never()).doFilter(req, res, chain); |
| 177 | + verify(chain, times(1)).doFilter(req, res); |
| 178 | + } |
| 179 | + |
| 180 | + @Test |
| 181 | + void testDoFilter_skipsJwtFilter_whenNoBearerAndNoCookie() throws Exception { |
| 182 | + PropertiesUtil.getPropertiesMap().put("ranger.sso.enabled", "false"); |
| 183 | + |
| 184 | + HttpServletRequest req = Mockito.mock(HttpServletRequest.class); |
| 185 | + HttpServletResponse res = Mockito.mock(HttpServletResponse.class); |
| 186 | + FilterChain chain = Mockito.mock(FilterChain.class); |
| 187 | + |
| 188 | + // no bearer header, no cookies |
| 189 | + Mockito.when(req.getHeader("Authorization")).thenReturn(null); |
| 190 | + Mockito.when(req.getCookies()).thenReturn(null); |
| 191 | + |
| 192 | + RangerJwtAuthFilter jwt = Mockito.mock(RangerJwtAuthFilter.class); |
| 193 | + RangerJwtAuthWrapper wrapper = new RangerJwtAuthWrapper(); |
| 194 | + setField(wrapper, "rangerJwtAuthFilter", jwt); |
| 195 | + |
| 196 | + wrapper.doFilter(req, res, chain); |
| 197 | + |
| 198 | + verify(jwt, never()).doFilter(req, res, chain); |
| 199 | + verify(chain, times(1)).doFilter(req, res); |
| 200 | + } |
| 201 | + |
| 202 | + @Test |
| 203 | + void testDoFilter_invokesJwtFilter_whenJwtCookiePresent() throws Exception { |
| 204 | + PropertiesUtil.getPropertiesMap().put("ranger.sso.enabled", "false"); |
| 205 | + |
| 206 | + HttpServletRequest req = Mockito.mock(HttpServletRequest.class); |
| 207 | + HttpServletResponse res = Mockito.mock(HttpServletResponse.class); |
| 208 | + FilterChain chain = Mockito.mock(FilterChain.class); |
| 209 | + |
| 210 | + Mockito.when(req.getHeader("Authorization")).thenReturn(null); |
| 211 | + Mockito.when(req.getCookies()).thenReturn(new Cookie[] {new Cookie("hadoop-jwt", "abc")}); |
| 212 | + RangerJwtAuthFilter jwt = Mockito.mock(RangerJwtAuthFilter.class); |
| 213 | + RangerJwtAuthWrapper wrapper = new RangerJwtAuthWrapper(); |
| 214 | + setField(wrapper, "rangerJwtAuthFilter", jwt); |
| 215 | + |
| 216 | + wrapper.doFilter(req, res, chain); |
| 217 | + |
| 218 | + verify(jwt, times(1)).doFilter(req, res, chain); |
| 219 | + verify(chain, times(1)).doFilter(req, res); |
| 220 | + } |
| 221 | + |
| 222 | + @Test |
| 223 | + void testDoFilter_redirectsToLogin_whenJwtAttemptedButUnauthenticated_andBrowserAgent() throws Exception { |
| 224 | + PropertiesUtil.getPropertiesMap().put("ranger.sso.enabled", "false"); |
| 225 | + System.setProperty("ranger.default.browser-useragents", "Mozilla"); |
| 226 | + |
| 227 | + HttpServletRequest req = Mockito.mock(HttpServletRequest.class); |
| 228 | + HttpServletResponse res = Mockito.mock(HttpServletResponse.class); |
| 229 | + FilterChain chain = Mockito.mock(FilterChain.class); |
| 230 | + |
| 231 | + Mockito.when(req.getHeader("Authorization")).thenReturn("Bearer token"); |
| 232 | + Mockito.when(req.getHeader("User-Agent")).thenReturn("Mozilla/5.0"); |
| 233 | + |
| 234 | + RangerJwtAuthFilter jwt = Mockito.mock(RangerJwtAuthFilter.class); |
| 235 | + Mockito.doNothing().when(jwt).doFilter(req, res, chain); |
| 236 | + |
| 237 | + RangerJwtAuthWrapper wrapper = new RangerJwtAuthWrapper(); |
| 238 | + wrapper.initialize(); // loads browser agents from properties/system property |
| 239 | + setField(wrapper, "rangerJwtAuthFilter", jwt); |
| 240 | + |
| 241 | + wrapper.doFilter(req, res, chain); |
| 242 | + |
| 243 | + verify(res, times(1)).sendRedirect("/login.jsp"); |
| 244 | + verify(chain, times(1)).doFilter(req, res); |
| 245 | + } |
| 246 | + |
| 247 | + private static void setField(Object target, String fieldName, Object value) throws Exception { |
| 248 | + Field f = target.getClass().getDeclaredField(fieldName); |
| 249 | + f.setAccessible(true); |
| 250 | + f.set(target, value); |
| 251 | + } |
127 | 252 | } |
0 commit comments